Skip to content

Commit

Permalink
Generated docs from job=generate-docs branch=master [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
Atomic Red Team doc generator committed Oct 24, 2023
1 parent 733d54c commit 842e8f8
Show file tree
Hide file tree
Showing 5 changed files with 5 additions and 9 deletions.
3 changes: 1 addition & 2 deletions atomics/Indexes/iaas_aws-index.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -52364,7 +52364,7 @@ credential-access:
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nelif
[ \"$(expr substr $(uname) 1 5)\" == \"Linux\" ]\nthen DOWNLOAD_URL=$(curl
-s https://api.github.com/repos/DataDog/stratus-red-team/releases/latest
| grep browser_download_url | grep linux_x86_64 | cut -d '\"' -f 4) \n wget
| grep browser_download_url | grep Linux_x86_64 | cut -d '\"' -f 4) \n wget
-q -O #{stratus_path}/stratus-red-team-latest.tar.gz $DOWNLOAD_URL\n tar
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nfi\n"
- description: 'Check if ~/.aws/credentials file has a default stanza is configured
Expand All @@ -52384,7 +52384,6 @@ credential-access:
--force\n"
cleanup_command: |
export AWS_REGION=#{aws_region}

echo "Cleanup detonation"
cd #{stratus_path}
./stratus cleanup --all
Expand Down
3 changes: 1 addition & 2 deletions atomics/Indexes/index.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -89328,7 +89328,7 @@ credential-access:
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nelif
[ \"$(expr substr $(uname) 1 5)\" == \"Linux\" ]\nthen DOWNLOAD_URL=$(curl
-s https://api.github.com/repos/DataDog/stratus-red-team/releases/latest
| grep browser_download_url | grep linux_x86_64 | cut -d '\"' -f 4) \n wget
| grep browser_download_url | grep Linux_x86_64 | cut -d '\"' -f 4) \n wget
-q -O #{stratus_path}/stratus-red-team-latest.tar.gz $DOWNLOAD_URL\n tar
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nfi\n"
- description: 'Check if ~/.aws/credentials file has a default stanza is configured
Expand All @@ -89348,7 +89348,6 @@ credential-access:
--force\n"
cleanup_command: |
export AWS_REGION=#{aws_region}

echo "Cleanup detonation"
cd #{stratus_path}
./stratus cleanup --all
Expand Down
3 changes: 1 addition & 2 deletions atomics/Indexes/linux-index.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -59316,7 +59316,7 @@ credential-access:
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nelif
[ \"$(expr substr $(uname) 1 5)\" == \"Linux\" ]\nthen DOWNLOAD_URL=$(curl
-s https://api.github.com/repos/DataDog/stratus-red-team/releases/latest
| grep browser_download_url | grep linux_x86_64 | cut -d '\"' -f 4) \n wget
| grep browser_download_url | grep Linux_x86_64 | cut -d '\"' -f 4) \n wget
-q -O #{stratus_path}/stratus-red-team-latest.tar.gz $DOWNLOAD_URL\n tar
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nfi\n"
- description: 'Check if ~/.aws/credentials file has a default stanza is configured
Expand All @@ -59336,7 +59336,6 @@ credential-access:
--force\n"
cleanup_command: |
export AWS_REGION=#{aws_region}

echo "Cleanup detonation"
cd #{stratus_path}
./stratus cleanup --all
Expand Down
3 changes: 1 addition & 2 deletions atomics/Indexes/macos-index.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -56674,7 +56674,7 @@ credential-access:
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nelif
[ \"$(expr substr $(uname) 1 5)\" == \"Linux\" ]\nthen DOWNLOAD_URL=$(curl
-s https://api.github.com/repos/DataDog/stratus-red-team/releases/latest
| grep browser_download_url | grep linux_x86_64 | cut -d '\"' -f 4) \n wget
| grep browser_download_url | grep Linux_x86_64 | cut -d '\"' -f 4) \n wget
-q -O #{stratus_path}/stratus-red-team-latest.tar.gz $DOWNLOAD_URL\n tar
-xzvf #{stratus_path}/stratus-red-team-latest.tar.gz --directory #{stratus_path}/\nfi\n"
- description: 'Check if ~/.aws/credentials file has a default stanza is configured
Expand All @@ -56694,7 +56694,6 @@ credential-access:
--force\n"
cleanup_command: |
export AWS_REGION=#{aws_region}

echo "Cleanup detonation"
cd #{stratus_path}
./stratus cleanup --all
Expand Down
2 changes: 1 addition & 1 deletion atomics/T1555.003/T1555.003.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
<blockquote>Adversaries may acquire credentials from web browsers by reading files specific to the target browser.(Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store; however, methods exist to extract plaintext credentials from web browsers.

For example, on Windows systems, encrypted credentials may be obtained from Google Chrome by reading a database file, <code>AppData\Local\Google\Chrome\User Data\Default\Login Data</code> and executing a SQL query: <code>SELECT action_url, username_value, password_value FROM logins;</code>. The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function <code>CryptUnprotectData</code>, which uses the victim’s cached logon credentials as the decryption key.(Citation: Microsoft CryptUnprotectData April 2018)

Adversaries have executed similar procedures for common web browsers such as FireFox, Safari, Edge, etc.(Citation: Proofpoint Vega Credential Stealer May 2018)(Citation: FireEye HawkEye Malware July 2017) Windows stores Internet Explorer and Microsoft Edge credentials in Credential Lockers managed by the [Windows Credential Manager](https://attack.mitre.org/techniques/T1555/004).

Adversaries may also acquire credentials by searching web browser process memory for patterns that commonly match credentials.(Citation: GitHub Mimikittenz July 2016)
Expand Down

0 comments on commit 842e8f8

Please sign in to comment.